Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w9fg-44qv-fpwf

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

SQL injection vulnerability in the loadByKey function in the TznDbConnection class in tzn_mysql.php in Tirzen (aka TZN) Framework 1.5, as used in TaskFreak! before 0.6.3, allows remote attackers to execute arbitrary SQL commands via the username field in a login action.

SQL injection vulnerability in the loadByKey function in the TznDbConnection class in tzn_mysql.php in Tirzen (aka TZN) Framework 1.5, as used in TaskFreak! before 0.6.3, allows remote attackers to execute arbitrary SQL commands via the username field in a login action.

EPSS

Процентиль: 72%
0.00734
Низкий

Дефекты

CWE-89

Связанные уязвимости

nvd
почти 16 лет назад

SQL injection vulnerability in the loadByKey function in the TznDbConnection class in tzn_mysql.php in Tirzen (aka TZN) Framework 1.5, as used in TaskFreak! before 0.6.3, allows remote attackers to execute arbitrary SQL commands via the username field in a login action.

EPSS

Процентиль: 72%
0.00734
Низкий

Дефекты

CWE-89